Home 0P3N Blog Learn to be a Hacker with Cybrary
Ready to Start Your Career?
Create Free Account
KnightsCode s profile image
By: KnightsCode
July 25, 2016

Learn to be a Hacker with Cybrary

By: KnightsCode
July 25, 2016
KnightsCode s profile image
By: KnightsCode
July 25, 2016
Learn to be a Hacker with Cybrary - CybraryWhere do you start with this? At the moment, you may have far too many people sharing their own ideas about being a hacker. I'm not here to sugar coat it for you. I'm not going to tell you that you need to be "creative," "adaptive," or "persistant". If you're choosing to be an ethical hacker, then you should possess these qualities already. If you find yourself uninterested after you find out what hard work it is, it's the wrong profession for you. And, this is a profession.The state of affairs with current learning in Universities across the world have seen only a slight improvement in offering actual courses for Cyber Security and Ethical Hacking. This is disturbing since Cybercrime in the UK alone accounts for more than physical crime now. With the recent Brexit from Europe, there should be more investment in Cyber Security development and education.This is where this small guide comes in. Using only your home computer and Cybrary, you can start your journey to becoming an Ethical HackerCoursesBeginnerCybrary has courses that can guide you on your way to starting this profession. Let's assume you know nothing about computers or how they work. Congrats, you get to start from the bottom. This isn't meant to put you off. This is a chance for you to learn and build a solid foundation for your learning. For this, you need to be looking at the CompTIA A+ and Network+ courses.I bet you're looking at a Linux build, Kali Linux, right? Maybe BlackArch? Let's get something straight: Kali and BlackArch are similar, but both have different commands built into them. You need to learn the basics or running a Linux system. Get on the Linux+ from CompTIA.By this time, you'll have a solid working knowledge of computer systems, networks and Linux. You can't build a better foundation for your studies. Yes, it will be long. Yes, it will sometimes seem like a grind. But, if you don't already possess the skills these courses will teach you, you're going to be wondering what the lecturers are talking about when it comes to the more advanced stuff. IntermediateTaking the next step, you can begin the fun side of Ethical Hacking: building your own lab environment. I'm not going to teach you how to do that here; there are plenty of places that will. But, there will be some things that you'll need:
  • A computer that allows virtualization
  • At least 6GB of RAM (For safely running a small virtualized network)
  • VMwarePlayer or VirtualBox
  • A Kali Linux VM
You'll need to start with the basics - Web Application Penetration Testing. This course does exactly what it says, giving you instruction on how to use Kali to attack most companies largest surface area: their web app. It takes you through several ways to break the security of websites and better equip yourself for the future. You also get familiar with Kali Linux this way.Penetration Testing and Ethical Hacking takes you through the CEH v8 course with Cybrary. Inside is useful theory and technical advice along with several attack vectors, offering another useful way to learn more of what you need.Metasploit should be a go-to for everyone. Cybrary has a complete course on this and once you download Metasploitable as a VM, you can use the program Metasploit that already comes with Kali Linux. It's another stepping stone. AdvancedAnd, then on to more advanced things: courses like Advanced Penetration Testing and Post Exploitation Hacking take you through what to do once you gain access to a system. Remember, this can all be learned through your own computer at home. I setup a network of ten using two computers. You can do this, too. Add-OnsWant to delve deeper? Or, perhaps you've found a specialization that you prefer? Good. Hackers aren't masters of everything. Normally, they're part of a team who all have different abilities. Some are good at Malware Analysis, some are good at Forensics, some at Social Engineering. Finding your niche is the best way to progress in Cyber Security, you can't be an expert at everything. Be the best you can be in your field.
Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry